메뉴 건너뛰기




Volumn 15, Issue , 2011, Pages 2852-2856

Surveying and analyzing security, privacy and trust issues in cloud computing environments

Author keywords

Cloud computing; Issue; Privacy; Security; Threat; Trust

Indexed keywords

CLOUD DATA; COMPUTING ENVIRONMENTS; ISSUE; MANAGEMENT FRAMEWORKS; PRIVACY AND TRUSTS; SECURITY; SECURITY CHALLENGES; SECURITY ISSUES; SENSITIVE APPLICATION; THREAT; TRUST; TRUST EVALUATION; VIRTUAL COMPUTING; VIRTUAL MACHINES;

EID: 84055200868     PISSN: 18777058     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1016/j.proeng.2011.08.537     Document Type: Conference Paper
Times cited : (143)

References (17)
  • 2
    • 63649117166 scopus 로고    scopus 로고
    • Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
    • Buyya R, Chee Shin Y, Venugopal S, Broberg J, Brandic I. Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems; 2009;25(6):599-616.
    • (2009) Future Generation Computer Systems , vol.25 , Issue.6 , pp. 599-616
    • Buyya, R.1    Chee Shin, Y.2    Venugopal, S.3    Broberg, J.4    Brandic, I.5
  • 4
    • 79954609461 scopus 로고    scopus 로고
    • The NIST definition of cloud computing
    • Mell P, Grance T. The NIST Definition of Cloud Computing. Communications of the ACM; 2010;53(6):50.
    • (2010) Communications of the ACM , vol.53 , Issue.6 , pp. 50
    • Mell, P.1    Grance, T.2
  • 5
    • 77953614890 scopus 로고    scopus 로고
    • Identifying the security risks associated with governmental use of cloud computing
    • Paquette S, Jaeger P T, Wilson S C. Identifying the security risks associated with governmental use of cloud computing. Government Information Quarterly; 2010;27(3):245-253.
    • (2010) Government Information Quarterly , vol.27 , Issue.3 , pp. 245-253
    • Paquette, S.1    Jaeger, P.T.2    Wilson, S.C.3
  • 6
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • Subashini S, Kavitha V. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications; 2011;34(1):1-11.
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 7
    • 79751493181 scopus 로고    scopus 로고
    • Locking the sky: A survey on IaaS cloud security
    • Vaquero L M, Rodero-Merino L, Morán D. Locking the sky: A survey on IaaS cloud security. Computing; 2011;91(1):93-118.
    • (2011) Computing , vol.91 , Issue.1 , pp. 93-118
    • Vaquero, L.M.1    Rodero-Merino, L.2    Morán, D.3
  • 9
    • 73149120473 scopus 로고    scopus 로고
    • Design, analysis, and deployment of omnipresent formal trust model (FTM) with trust bootstrapping for pervasive environments
    • Ahamed S I, Haque M M, Endadul Hoque M, Rahman F, Talukder N. Design, analysis, and deployment of omnipresent formal trust model (FTM) with trust bootstrapping for pervasive environments. Journal of Systems and Software; 2010;83(2):253-270.
    • (2010) Journal of Systems and Software , vol.83 , Issue.2 , pp. 253-270
    • Ahamed, S.I.1    Haque, M.M.2    Endadul Hoque, M.3    Rahman, F.4    Talukder, N.5
  • 10
    • 78951469672 scopus 로고    scopus 로고
    • Resource discovery in a grid system: Directing requests to trustworthy virtual organizations based on global trust values
    • Karaoglanoglou K, Karatza H. Resource discovery in a Grid system: Directing requests to trustworthy virtual organizations based on global trust values. Journal of Systems and Software; 2011;84(3):465-478.
    • (2011) Journal of Systems and Software , vol.84 , Issue.3 , pp. 465-478
    • Karaoglanoglou, K.1    Karatza, H.2
  • 11
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • Takabi H, Joshi J B D, Ahn G. Security and privacy challenges in cloud computing environments. IEEE Security & Privacy; 2010;8(6):24-31.
    • (2010) IEEE Security & Privacy , vol.8 , Issue.6 , pp. 24-31
    • Takabi, H.1    Joshi, J.B.D.2    Ahn, G.3
  • 15
    • 67650320950 scopus 로고    scopus 로고
    • A survey of computational location privacy
    • Krumm J. A survey of computational location privacy. Personal and Ubiquitous Computing; 2009;13(6):291-399.
    • (2009) Personal and Ubiquitous Computing , vol.13 , Issue.6 , pp. 291-399
    • Krumm, J.1
  • 16
    • 76449111367 scopus 로고    scopus 로고
    • Modeling and evaluation of trust with an extension in semantic web
    • Shekarpour S, Katebi S D. Modeling and evaluation of trust with an extension in semantic web. Journal of Web Semantics; 2010;8(1):26-36.
    • (2010) Journal of Web Semantics , vol.8 , Issue.1 , pp. 26-36
    • Shekarpour, S.1    Katebi, S.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.